An Introduction to Ethical Hacking with Kali Linux
Video description
Expose vulnerabilities of servers and applications and help developers create robust systems
About This Video
Learn the use of popular tools in ethical hacking
Expose vulnerabilities in systems
Identify and record security flaws and breaches
In Detail
Learn ethical hacking through Kali Linux, one of the leading computer security operating systems. In this course, you will learn how to gather information, detect vulnerabilities, …
An Introduction to Ethical Hacking with Kali Linux
Video description
Expose vulnerabilities of servers and applications and help developers create robust systems
About This Video
Learn the use of popular tools in ethical hacking
Expose vulnerabilities in systems
Identify and record security flaws and breaches
In Detail
Learn ethical hacking through Kali Linux, one of the leading computer security operating systems. In this course, you will learn how to gather information, detect vulnerabilities, and exploit them using tools in Kali Linux. This course will give you all of the tools that you need to be able to test your own servers and applications for vulnerabilities.
Computer security is one of the fastest-growing fields in technology, and ethical hacking is one of the best skills to learn in the field. With a new attack being completed every 39 seconds, it is essential that security experts are equipped with the most powerful tools for the job. The tools in Kali Linux are commonly used by attackers and defenders to help secure their systems. Learning these tools will allow you to secure your system before the attackers get to it.
You will learn how to exploit common vulnerabilities in Linux and Windows, as well as how to find common vulnerabilities in web apps such as command injections and SQL injections.
Setting Up Web Servers and Vulnerable Applications
Chapter 2 : Information Gathering
DNS Analysis
IDS and IPS Detection
Live Host Identification
Network and Port Scanners
Open-Source Intelligence
Enum4Linux
Dmitry
Recon-ng
Sparta
Chapter 3 : Vulnerability Analysis
Nikto
unix-privesc-check
Chapter 4 : Web Application Analysis and Exploitation
wpscan
Burp Suite
Wfuzz
Commix
Sqlmap
Metasploit
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept